General

  • Target

    d53ffd1fce97043454f3926eb7fa0618_JaffaCakes118

  • Size

    4.7MB

  • Sample

    241208-e5yzcasqcw

  • MD5

    d53ffd1fce97043454f3926eb7fa0618

  • SHA1

    5bdd5ff0071b867d26bb314e565cb6d4e5468a7e

  • SHA256

    a587faa9be47724317847e4404a21a1af65fdb9c4c8de216ed7c33fc1aea4dff

  • SHA512

    04e9ec5a6ef3314146297e51a3b93a3775fe875e3abc7a61f1b00359c613bb2c7a431fc410e5532583006a929d43c4a9a71ffe9b911f81f5c1321f486d33dac4

  • SSDEEP

    98304:49YceCRZRcjVmkTt/P5JlBvZiH6aNei2WNB4ELoXY7y/C8q/b7nmEgHJXp:4aceOchvT9flBvZiH6aNHRuYoXY7Y1q2

Malware Config

Targets

    • Target

      d53ffd1fce97043454f3926eb7fa0618_JaffaCakes118

    • Size

      4.7MB

    • MD5

      d53ffd1fce97043454f3926eb7fa0618

    • SHA1

      5bdd5ff0071b867d26bb314e565cb6d4e5468a7e

    • SHA256

      a587faa9be47724317847e4404a21a1af65fdb9c4c8de216ed7c33fc1aea4dff

    • SHA512

      04e9ec5a6ef3314146297e51a3b93a3775fe875e3abc7a61f1b00359c613bb2c7a431fc410e5532583006a929d43c4a9a71ffe9b911f81f5c1321f486d33dac4

    • SSDEEP

      98304:49YceCRZRcjVmkTt/P5JlBvZiH6aNei2WNB4ELoXY7y/C8q/b7nmEgHJXp:4aceOchvT9flBvZiH6aNHRuYoXY7Y1q2

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks